Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Antimalware Doctor was just the start of the problems


  • This topic is locked This topic is locked
23 replies to this topic

#1 DVDfever

DVDfever

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 09 October 2010 - 06:47 PM

Hi, I've visited these forums before but not registered until tonight.

24hrs ago I got hit about this piece of malware and since then I've been into safe mode more times than I've had hot dinners, then run Malwarebytes Anti Malware program and attempted to go back into the normal desktop. Sometimes it would, sometimes I've had to do "last known good configuration" and sometimes it's even reset after the latter! Earlier today it reset for BOTH of these! :thumbsup:

Every time it resets it gets as far as the green 'ticker' going from left to right, then Bluescreen, and round we go.

At one point after seemingly getting rid, I tried to roll back to my last restore point (Thurs morning) but the problems didn't go away. Tried since to go back to the present and although I did get back to the proper desktop, it said it couldn't restore the point!

While I've been out tonight, its come up with error msgs for two things not working inc. "Civilisation V Launcher". WTF?!

I go to run Malwarebytes Anti Malware and it tells me it can't find it. I look in that directory and it's renamed the file to "mbam .exe" and stuck something else in the place of "mbam.exe"

After a few hours of uptime, I'm also getting "the dependency service or group failed to start" on a lot of things when I run them.

Can someone please tell me how I fix this? I've never had anything as bad as this before.

I'm using a 2-year-old Medion PC with Windows Vista Home Premium, 4Gb RAM and it's a Quad Core machine.

Thanks in advance, Dom

Edited by DVDfever, 09 October 2010 - 06:54 PM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,556 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:04 AM

Posted 09 October 2010 - 08:06 PM

Hello and welcome DVDfever. I am moving this for a bit from Vista to the Am I Infected forum. I think we still ahve something.

Reboot into Safe Mode with Networking
How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode with Networking using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.


>>>> Download this file and doubleclick on it to run it. Allow the information to be merged with the registry.

RKill....

Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply
Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.



Next run Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 07:38 AM

Hi Boopme, thanks for your email and I'm at the point where I've done a full scan with Superantispyware and it's found a ton of stuff, but I'm reticent to let it delete everything for reasons I'll explain (I'll post a full log when I have let it delete stuff but for the moment I'll have to explain it here).

The malware has duplicated around 20 .exe files such that the malware version is, for example, "mbam.exe" and the okay version is "mbam .exe", so I'm thinking - let it delete the bad one, I'll reboot into safe mode and then correct the okay versions. This even includes a couple of worrying files such as things that came with the PC like ISUSPM.exe from the InstallShield directory within CommonFiles and also IAANOTIF.exe from within the "Program Files/Intel/Intel Matrix Storage Manager" directory.

The other thing is that it wants to delete the associated startup entries for these, which I'm very reticent to do because I don't know if it'll just untick these and let me tick them again, or delete them completely and so I'm stuffed as to how to get some of them to comply again, such as the equivalents of the worrying files above. I was thinking first - try it with one of them, like, mbam, since I can run that manually if need be and add it as a startup item later - but then I thought I'd ask here first just to make sure as I don't want to blindly delete everything and then find the PC won't boot up again.

Thanks in advance.

#4 greyseal2012

greyseal2012

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Yorkshire
  • Local time:02:04 PM

Posted 10 October 2010 - 08:09 AM

Hi,

I think I have just recovered from a similar infection - 'GoldG' - I'm running Vista Home Premium. It's messed up the system quite a bit and from my experience, there is no antivirus or malware which can fix it. I basically followed Grinler's method several times but kept noticing there were 4 files associated with GoldG which mbam and orther software missed - for me - those files were 'ywq.exe; ywr.exe; yws.exe & ywt.exe' these were also linked to 4 files which kept altering their filenames. In the end, I followed Grinler's advice to the full but before I rebooted, I used 'Task Manager' to locate these files and deleted them all. Then I rebooted. The system has been free of the virus/malware since - but it has left the system in a bit of a state. Don't know if this helps - btw - don't click on any messages which may pop up and prompt you to take security actions or look for on-line help/assistance. I know it was presenting me with fake McAfee warnings. I also identified some files from their dates - I knew when I caught the virus.

I would just like to thank those members who have contributed so much to this forum, and for their assistance - I'm not an IT Expert and this virus has had me pulling my hair out at the roots - so it's reasuring to know there are people like these in a forum like this who freely offer their support & assistance.

Edited by greyseal2012, 10 October 2010 - 08:28 AM.


#5 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 08:57 AM

Hi,

I think I have just recovered from a similar infection - 'GoldG' - I'm running Vista Home Premium. It's messed up the system quite a bit and from my experience, there is no antivirus or malware which can fix it. I basically followed Grinler's method several times but kept noticing there were 4 files associated with GoldG which mbam and orther software missed - for me - those files were 'ywq.exe; ywr.exe; yws.exe & ywt.exe' these were also linked to 4 files which kept altering their filenames. In the end, I followed Grinler's advice to the full but before I rebooted, I used 'Task Manager' to locate these files and deleted them all. Then I rebooted. The system has been free of the virus/malware since - but it has left the system in a bit of a state. Don't know if this helps - btw - don't click on any messages which may pop up and prompt you to take security actions or look for on-line help/assistance. I know it was presenting me with fake McAfee warnings. I also identified some files from their dates - I knew when I caught the virus.

I would just like to thank those members who have contributed so much to this forum, and for their assistance - I'm not an IT Expert and this virus has had me pulling my hair out at the roots - so it's reasuring to know there are people like these in a forum like this who freely offer their support & assistance.


Did it also remove the startup entries from your programs? And if so, how did you get all those back? That's the most worrying part for me. Ta.

BTW, although I've set to receive email notifications from this site, I'm not getting them. I've checked my spam filter and nothing in there so I don't think they're actually being sent out. Is there an issue with that? Thanks.

PS. Just to add insult to injury, I can't find my system discs for the PC :thumbsup:

Edited by DVDfever, 10 October 2010 - 09:13 AM.


#6 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 10:21 AM

Hi, here's the log from Superantispyware. For each of those .exe files it removed, it left, eg. "mbam .exe" and I've altered each of those to remove the space. It's also removed the startups for each one. I understand I can drag each of these to
the Startup folder, but is that the one in "Programs > Startup"? Thanks.

Off to do the MBAM one now.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/10/2010 at 12:17 PM

Application Version : 4.0.1154

Core Rules Database Version : 5662
Trace Rules Database Version: 3474

Scan type : Complete Scan
Total Scan Time : 02:01:40

Memory items scanned : 293
Memory threats detected : 0
Registry items scanned : 9326
Registry threats detected : 20
File items scanned : 237742
File threats detected : 33

Trojan.Agent/Gen-Virut
[IAAnotif] C:\PROGRAM FILES\INTEL\INTEL MATRIX STORAGE MANAGER\IAANOTIF.EXE
C:\PROGRAM FILES\INTEL\INTEL MATRIX STORAGE MANAGER\IAANOTIF.EXE
[TVEService] C:\PROGRAM FILES\HOMECINEMA\TV ENHANCE\TVESERVICE.EXE
C:\PROGRAM FILES\HOMECINEMA\TV ENHANCE\TVESERVICE.EXE
[AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\AVGTRAY.EXE
C:\PROGRA~1\AVG\AVG8\AVGTRAY.EXE
[AdobeCS4ServiceManager] C:\PROGRAM FILES\COMMON FILES\ADOBE\CS4SERVICEMANAGER\CS4SERVICEMANAGER.EXE
C:\PROGRAM FILES\COMMON FILES\ADOBE\CS4SERVICEMANAGER\CS4SERVICEMANAGER.EXE
[Adobe Acrobat Speed Launcher] C:\PROGRAM FILES\ADOBE\ACROBAT 9.0\ACROBAT\ACROBAT_SL.EXE
C:\PROGRAM FILES\ADOBE\ACROBAT 9.0\ACROBAT\ACROBAT_SL.EXE
[Acrobat Assistant 8.0] C:\PROGRAM FILES\ADOBE\ACROBAT 9.0\ACROBAT\ACROTRAY.EXE
C:\PROGRAM FILES\ADOBE\ACROBAT 9.0\ACROBAT\ACROTRAY.EXE
[SunJavaUpdateSched] C:\PROGRAM FILES\JAVA\JRE6\BIN\JUSCHED.EXE
C:\PROGRAM FILES\JAVA\JRE6\BIN\JUSCHED.EXE
[Ask and Record FLV Service] C:\PROGRAM FILES\REPLAY MEDIA CATCHER\FLVSRVC.EXE
C:\PROGRAM FILES\REPLAY MEDIA CATCHER\FLVSRVC.EXE
[QuickTime Task] C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE
C:\PROGRAM FILES\QUICKTIME\QTTASK.EXE
[Malwarebytes Anti-Malware (reboot)] C:\PROGRAM FILES\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE
C:\PROGRAM FILES\MALWAREBYTES' ANTI-MALWARE\MBAM.EXE
[CTSyncU.exe] C:\PROGRAM FILES\CREATIVE\SYNC MANAGER UNICODE\CTSYNCU.EXE
C:\PROGRAM FILES\CREATIVE\SYNC MANAGER UNICODE\CTSYNCU.EXE
[DAEMON Tools Lite] C:\PROGRAM FILES\DAEMON TOOLS LITE\DAEMON.EXE
C:\PROGRAM FILES\DAEMON TOOLS LITE\DAEMON.EXE
[IndxStoreSvr_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] C:\PROGRAM FILES\COMMON FILES\NERO\LIB\NMINDEXSTORESVR.EXE
C:\PROGRAM FILES\COMMON FILES\NERO\LIB\NMINDEXSTORESVR.EXE
[ISUSPM] C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM.EXE
C:\PROGRAM FILES\COMMON FILES\INSTALLSHIELD\UPDATESERVICE\ISUSPM.EXE
[Active Desktop Calendar] C:\PROGRAM FILES\ACTIVE DESKTOP CALENDAR\ADC.EXE
C:\PROGRAM FILES\ACTIVE DESKTOP CALENDAR\ADC.EXE
[TotalRecorderScheduler] C:\PROGRAM FILES\HIGHCRITERIA\TOTALRECORDER\TOTRECSCHED.EXE
C:\PROGRAM FILES\HIGHCRITERIA\TOTALRECORDER\TOTRECSCHED.EXE
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\CTSyncU.exe
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\CTSyncU.exe#Path
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\mbam.exe#Path
C:\PROGRAM FILES\AVG\AVG8\AVGTRAY.EXE
C:\Windows\Prefetch\AVGTRAY.EXE-420799B7.pf
C:\Windows\Prefetch\MBAM.EXE-CD3441D7.pf

Adware.Tracking Cookie
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@ad.yieldmanager[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@ads.xapads[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@advertise[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@adviva[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@apmebf[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@atdmt[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@bizzclick[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@content.yieldmanager[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@doubleclick[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@eas.apm.emediate[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@mediaplex[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@newsquestdigitalmedia.122.2o7[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@revsci[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@specificclick[2].txt

#7 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 10:43 AM

Oh no! I think I've done a really stupid thing. I rebooted into safe mode again after letting Superantispyware do its thing, as I thought that's where I was meant to do mbam, then I realised I should do them in normal mode. Then, after renaming those files to, eg. "mbam.exe" from "mbam .exe", I then rebooted into normal mode and they've all gone!!

Please help!! :thumbsup:

Edited by DVDfever, 10 October 2010 - 10:44 AM.


#8 greyseal2012

greyseal2012

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Yorkshire
  • Local time:02:04 PM

Posted 10 October 2010 - 12:58 PM

Hi DVDfeaver - Just PM'd you. Yes it did remove a lot of my start-up entries.

#9 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 01:43 PM

Hi DVDfeaver - Just PM'd you. Yes it did remove a lot of my start-up entries.


Ta muchly. I'm going to try the MBAM process described above in a bit, but I think after what I've done today I'm heading for a full reinstall :thumbsup:

I'm also going to try a Startup Repair which I've been recommended by someone else. I think it's all leading to the inevitable though.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,556 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:04 AM

Posted 10 October 2010 - 02:19 PM

Here's the Problem. Trojan.Agent/Gen-Virut

Your system is infected with a nasty variant of Virut, a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, and opens a back door that compromises your computer. Using this backdoor, a remote attacker can access and instruct the infected computer to download and execute more malicious files.

-- Note: As with most malware infections, the threat name may be different depending on the anti-virus or anti-malware program which detected it. Each security vendor uses their own naming conventions to identify various types of malware.With this particular infection, the safest solution and only sure way to remove it effectively is to reformat and reinstall the OS.

Why? According to this Norman White Paper Assessment of W32/Virut, some variants can infect the HOSTS file and block access to security related web sites. Other variants of virut can even penetrate and infect .exe files within compressed files (.zip, .cab, rar). The Virux and Win32/Virut.17408 variants are an even more complex file infectors which can embed an iframe into the body of web-related files and infect script files (.php, .asp, .htm, .html, .xml). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair and in some instances can disable Windows File Protection. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable. The longer virut remains on a computer, the more critical system files will become infected and corrupt so the degree of damage can vary.

The virus disables Windows File Protection by injecting code into the "winlogon.exe" process that patches system code in memory.

CA Virus detail of W32/Virut

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.

McAfee Risk Assessment and Overview of W32/Virut

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus...Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.

AVG Overview of W32/VirutVirut is commonly spread via a flash drive (usb, pen, thumb, jump) infection using RUNDLL32.EXE and other malicious files. It is often contracted by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and a major source of system infection.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

However, the CA Security Advisor Research Blog have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

Since virut is not effectively disinfectable, your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. In many cases the infected files (which can number in the thousands) cannot be deleted and anti-malware scanners cannot disinfect them properly. Security vendors that claim to be able to remove file infectors cannot guarantee that all traces of it will be removed as they may not find all the remnants. If something goes awry during the malware removal process there is always a risk the computer may become unstable or unbootable and you could loose access to all your data.

Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed.

Many experts in the security community believe that once infected with this type of malware, the best course of action is to reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:

Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:
• Reimaging the system
• Restoring the entire system using a full system backup from before the backdoor infection
• Reformatting and reinstalling the system

Backdoors and What They Mean to You

This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do?.

The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 05:15 PM

Hi boopme, thanks for your reply.

Things have got even worse with this to the point where Safe Mode with Networking doesn't work properly. I can access Seamonkey (my browser) as that was running on it last time, but it I move the mouse down to the taskbar it just gives the 'busy' symbol.

In normal mode, nothing works properly at all, or even runs when I try to run them.

I'm in safe mode at the moment, but previously I was in normal mode and ran MBAM again (had to do it a further time as I accidentally clicked 'ignore' to one of the 14 threats that came up). I can't access Windows Explorer in safe mode as I type so can't attach it here but am going to go into normal mode, then copy it to USB and copy that to my laptop.

As for reformatting and reinstalling, I've only got a recovery disc for this PC so it can only reinstall on top of everything else, so I'm not sure what to do about that.

#12 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 06:04 PM

Okay, I'm in normal mode as I type, but am using IE as I can't run Seamonkey in normal mode.

Here's the first log, before I 'ignored' one result accidentally:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4791

Windows 6.0.6001 Service Pack 1
Internet Explorer 7.0.6001.18000

10/10/2010 22:41:18
mbam-log-2010-10-10 (22-41-18).txt

Scan type: Quick scan
Objects scanned: 162093
Time elapsed: 8 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 1
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{a639e0cf-1696-82f5-81dd-c6c26fa8b78e} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\program files\microsoft\desktoplayer.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (c:\windows\system32\userinit.exe,,c:\program files\microsoft\desktoplayer.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\system32 (Backdoor.Bifrose) -> Quarantined and deleted successfully.

Files Infected:
C:\Windows\System32\DllHostSrv.exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
C:\Windows\System32\svchostSrv.exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.9538275026178853.exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
C:\Windows\ExplorerSrv.exe (Heuristics.Shuriken) -> Quarantined and deleted successfully.
C:\Program Files\Microsoft\desktoplayer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Users\Public\Documents\Windows\winhelp.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Users\Public\Documents\Server\admin.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\Users\Public\Documents\Server\server.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Users\DVDfever 2009\AppData\Roaming\Wuobm\dohe.exe (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.


And here's the second:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4791

Windows 6.0.6001 Service Pack 1
Internet Explorer 7.0.6001.18000

10/10/2010 22:46:31
mbam-log-2010-10-10 (22-46-31).txt

Scan type: Quick scan
Objects scanned: 162423
Time elapsed: 4 minute(s), 39 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{a639e0cf-1696-82f5-81dd-c6c26fa8b78e} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,556 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:04 AM

Posted 10 October 2010 - 06:54 PM

This is another back door infection. Trojan.ZbotR.Gen)
This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#14 DVDfever

DVDfever
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:02:04 PM

Posted 10 October 2010 - 07:45 PM

This is another back door infection. Trojan.ZbotR.Gen)
This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS.


Just hit upon one thing not nice. I put the Recovery CD in, ready to reinstall Windows (well, I wanted to see how that menu looked before I went to bed so I've got some idea of what I'm looking at in the morning), but before I went on with ...it, the manual accompanying it says "For distribution with a new PC". Ok, fine. But in the check list it says to have ready the 25-key serial number for it. Erm... there isn't one on the disc!

So, I go over to the Medion Support forums and it appears that disc is rather pointless and that the Application & Support CD is the one to use, but that this is just a 'restore to original factory settings' type disc. This link goes direct to my latest post, but the previous page has more info about doing a system restore on my Medion PC. Any advice most welcomed, but I'm not at all pleased when I want to do a reformat and reinstall and it won't let me.

http://www.medionsupport.com/phpbb2/viewto...p?p=96630#96630

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,556 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:08:04 AM

Posted 10 October 2010 - 11:10 PM

THe Vista forum folks can help you do this.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users